Vulnerabilities > Unisys > Clearpath MCP
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-02-26 | CVE-2018-5762 | Unspecified vulnerability in Unisys Clearpath MCP 58.1/59.1 The TLS implementation in the TCP/IP networking module in Unisys ClearPath MCP systems with TCP-IP-SW 58.1 before 58.160, 59.1 before 059.1a.17 (IC #17), and 60.0 before 60.044 might allow remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a ROBOT attack. network unisys | 4.3 |
2017-03-10 | CVE-2017-5872 | Improper Input Validation vulnerability in Unisys Clearpath MCP 57.1/58.1/59.1 The TCP/IP networking module in Unisys ClearPath MCP systems with TCP-IP-SW 57.1 before 57.152, 58.1 before 58.142, or 59.1 before 59.172, when running a TLS 1.2 service, allows remote attackers to cause a denial of service (network connectivity disruption) via a client hello with a signature_algorithms extension above those defined in RFC 5246, which triggers a full memory dump. | 5.0 |
2002-12-31 | CVE-2002-2179 | Denial Of Service vulnerability in Unisys Clearpath MCP Portscan The dynamic initialization feature of the ClearPath MCP environment allows remote attackers to cause a denial of service (crash) via a TCP port scan using a tool such as nmap. | 7.8 |